Module1 Flashcards

1
Q

What are the benefits of Security?

A

• Protects against external and internal threats
• Meets regulatory compliance (laws & guidelines)
• Maintains and improves business productivity
• Reduces expenses associated with risk
• Maintains brand trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a “Threat Actor”?

A

Any person or group who presents a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cybersecurity?

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorised access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do security analysts do?

A

Security analysts are responsible for monitoring and protecting information and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is “compliance”?

A

The process of adhering to internal standards and external regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are “Security Frameworks”?

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are “Security Controls”?

A

Safeguards designed to reduce specific security risks. Used within security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is “Security Posture”?

A

An organisation’s ability to manage its defence of critical assets and data and react to change.

NOTE: Strong security posture = lower risk for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is “Network Security “?

A

The practice of keeping an organisation’s network infrastructure secure from unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is “Cloud Security”?

A

The process of ensuring that assets stored in the cloud are properly configured or set up correctly and access to those assets is limited to authorised users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is “The Cloud”?

A

A network made up of a collection of servers or computers that store resources and data in remote physical locations (data centres) that can be accessed via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an external threat?

A

Someone outside of an organisation trying to gain access to private networks, information, or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an internal threat?

A

Current or former employees, trusted partners, or external vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the responsibilities of a Security Analyst?

A

• Protecting computer and network systems
• Installing prevention software
• Conducting periodic security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SIEM stand for?

A

Security Information & Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do digital forensics investigators do?

A

Attempt to identify, analyse, and preserve criminal evidence within networks, computers, and electronic devices

17
Q

What does PII stand for?

A

Personally Identifiable Information

18
Q

What does SPII stand for?

A

Sensitive Personally Identifiable Information

19
Q

What is an example of PII?

A

Email address
Date of birth
Phone number
Home address
IP address
Physical address

20
Q

What is an example of SPII?

A

Medical information
Financial information
Biometric data
Social security numbers

21
Q

What is “Identity Theft”?

A

The act of stealing personal information to commit fraud while impersonating the victim.

22
Q

What is the primary objective of Identity Theft?

A

Financial gain

23
Q

What is programming?

A

A process that can be used to create a specific set of instructions for a computer to execute tasks.

24
Q

What is a security audit?

A

A review of an organisation’s security records, activities, and other related documents.

25
Q

What does Network Security cover?

A

Data, services, systems, and devices that are stored in an organisation’s network.